PQC READINESS / MODULE 01
Inventory & Risk Mapping
You cannot secure what you cannot see. The first step is to establish a complete inventory of your current cryptographic estate and analyse exposure.
The Assessment Scope
Cryptographic Asset Discovery
Comprehensive discovery of all cryptographic assets, including algorithms, key lengths, digital certificates, key management programmes, and protocols (e.g., TLS, VPNs).
Risk Categorisation
Mapping the cryptographic inventory against data classification and data lifetime requirements. We prioritise systems where data confidentiality must be preserved for decades.
Supply Chain Vulnerability
Assessing third-party dependencies (cloud providers, software libraries, hardware) that rely on legacy cryptography, which will soon become unpatched liabilities.
Assessment Outputs
DELIVERABLE 01
The Estate Register
A unified dashboard view of every certificate, key, and library instance across your cloud and on-premise environments.
DELIVERABLE 02
Priority Heatmap
A prioritized remediation list focusing on “Harvest Now, Decrypt Later” targets first.
INDUSTRY STANDARD
The CBOM
We generate a Cryptography Bill of Materials.
Just as an SBOM tracks software components, the CBOM creates a machine-readable record of your cryptography, essential for future audits and regulatory reporting.
Uncover Your Exposure.
Get a clear view of your quantum risk profile in weeks, not months.
